CN110121010A - One key outgoing call implementation method, terminal, medium and electronic equipment - Google Patents
One key outgoing call implementation method, terminal, medium and electronic equipment Download PDFInfo
- Publication number
- CN110121010A CN110121010A CN201910394162.0A CN201910394162A CN110121010A CN 110121010 A CN110121010 A CN 110121010A CN 201910394162 A CN201910394162 A CN 201910394162A CN 110121010 A CN110121010 A CN 110121010A
- Authority
- CN
- China
- Prior art keywords
- present terminal
- banquet
- terminal
- encrypted
- attended
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0807—Network architectures or network communication protocols for network security for authentication of entities using tickets, e.g. Kerberos
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M3/00—Automatic or semi-automatic exchanges
- H04M3/42—Systems providing special services or facilities to subscribers
- H04M3/50—Centralised arrangements for answering calls; Centralised arrangements for recording messages for absent or busy subscribers ; Centralised arrangements for recording messages
- H04M3/51—Centralised call answering arrangements requiring operator intervention, e.g. call or contact centers for telemarketing
- H04M3/5166—Centralised call answering arrangements requiring operator intervention, e.g. call or contact centers for telemarketing in combination with interactive voice response systems or voice portals, e.g. as front-ends
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M3/00—Automatic or semi-automatic exchanges
- H04M3/42—Systems providing special services or facilities to subscribers
- H04M3/50—Centralised arrangements for answering calls; Centralised arrangements for recording messages for absent or busy subscribers ; Centralised arrangements for recording messages
- H04M3/51—Centralised call answering arrangements requiring operator intervention, e.g. call or contact centers for telemarketing
- H04M3/523—Centralised call answering arrangements requiring operator intervention, e.g. call or contact centers for telemarketing with call distribution or queueing
- H04M3/5231—Centralised call answering arrangements requiring operator intervention, e.g. call or contact centers for telemarketing with call distribution or queueing with call back arrangements
Abstract
The present invention provides implementation method, terminal, medium and the electronic equipment of an a kind of key outgoing call.Wherein, which comprises send application for registration to call center services end;Obtain the application ID and applied cryptography that the server-side returns;In conjunction with present terminal and the application ID, applied cryptography, the authorization access token of the present terminal is exchanged for;The essential information that the present terminal is attended a banquet is encrypted into the authorization access token of the present terminal, the authorization access token that the present terminal is attended a banquet is obtained;External calling telephone number carries out symmetric cryptography, obtains encrypted number;It sends the encrypted number and authorization access token that the present terminal is attended a banquet is to call center services end, so that the true number of call center services end calling customer.
Description
Technical field
The present invention relates to field of communication technology, in particular to an a kind of key outgoing call implementation method, terminal, medium and
Electronic equipment.
Background technique
Call center is a kind of place or system that centralized user service is realized based on modern communication technology.In calling
The heart mostly uses greatly CTI (Computer and Telephony Integrator, computer and communication are integrated) technology, it is main
It including Call Center Platform and attends a banquet, Call Center Platform mainly includes server-side.
Currently, the call center system unified based on company, each business team needs to access and carries out outgoing call demand, outside
Attend a banquet during exhaling and need to repeatedly input complicated telephone number, cannot a key dial to client.
Therefore, in long-term research and development, inventor has carried out a large amount of research to a key outgoing call, proposes an a kind of key
One of outgoing call implementation method, to solve the above technical problems.
Summary of the invention
The purpose of the present invention is to provide an a kind of key outgoing call implementation method, terminal, medium and electronic equipments, are able to solve
At least one technical problem mentioned above.Concrete scheme is as follows:
Specific embodiment according to the present invention, in a first aspect, the present invention provides a kind of implementation method of a key outgoing call, packet
It includes: sending application for registration to call center services end;Obtain the application ID and applied cryptography that the server-side returns;In conjunction with current
Terminal and the application ID, applied cryptography, exchange the authorization access token of the present terminal for;The present terminal is attended a banquet
Essential information is encrypted into the authorization access token of the present terminal, is obtained the authorization access that the present terminal is attended a banquet and is enabled
Board;External calling telephone number carries out symmetric cryptography, obtains encrypted number;It sends the encrypted number and the present terminal is attended a banquet
Authorization access token to call center services end so that the true number of call center services end calling customer.
Specific embodiment according to the present invention, second aspect, the present invention provide a kind of terminal, comprising: application sends mould
Block, for sending application for registration to call center services end;Obtain module, for obtain application ID that the server-side returns and
Applied cryptography;Module is exchanged for, for exchanging awarding for the present terminal in conjunction with present terminal and the application ID, applied cryptography
Weigh access token;Information encrypting module, the essential information for the present terminal to be attended a banquet are encrypted to the present terminal
It authorizes in access token, obtains the authorization access token that the present terminal is attended a banquet;Telephone encryption module is used for external calling telephone
Number carries out symmetric cryptography, obtains encrypted number;Data transmission blocks are attended a banquet for the encrypted number and the present terminal
Authorization access token to call center services end so that the true number of call center services end calling customer.
Specific embodiment according to the present invention, the third aspect, the present invention provide a kind of computer readable storage medium,
On be stored with computer program, when described program is executed by processor realize as above described in any item key outgoing call realization sides
Method.
Specific embodiment according to the present invention, fourth aspect, the present invention provide a kind of electronic equipment, comprising: one or
Multiple processors;Storage device, for storing one or more programs, when one or more of programs are by one or more
When a processor executes, so that one or more of processors realize as above described in any item key outgoing call implementation methods.
The above scheme of the embodiment of the present invention compared with prior art, attends a banquet in the present invention and no longer needs to input complicated electricity
Number is talked about, and can be realized one key of seat personnel and dial into client;Encryption and decryption transmission can be carried out to original phone number, attended a banquet
It cannot see that the true number of client, to protect the privacy of user;Further, the working efficiency and data of seat personnel are promoted
Accuracy.
Detailed description of the invention
The drawings herein are incorporated into the specification and forms part of this specification, and shows and meets implementation of the invention
Example, and be used to explain the principle of the present invention together with specification.It should be evident that the accompanying drawings in the following description is only the present invention
Some embodiments for those of ordinary skill in the art without creative efforts, can also basis
These attached drawings obtain other attached drawings.In the accompanying drawings:
Fig. 1 shows a kind of flow chart of key outgoing call implementation method according to an embodiment of the present invention;
Fig. 2 shows the method flows of the true number of call center services end according to an embodiment of the present invention calling customer
Figure;
Fig. 3 shows a kind of structural schematic diagram of terminal according to an embodiment of the present invention;
Fig. 4 shows the structural schematic diagram at call center services end according to an embodiment of the present invention;
Fig. 5 shows the structural schematic diagram of the electronic equipment of embodiment according to the present invention;
Fig. 6 shows the electronic equipment attachment structure schematic diagram of embodiment according to the present invention.
Specific embodiment
To make the objectives, technical solutions, and advantages of the present invention clearer, below in conjunction with attached drawing to the present invention make into
It is described in detail to one step, it is clear that described embodiments are only a part of the embodiments of the present invention, rather than whole implementation
Example.Based on the embodiments of the present invention, obtained by those of ordinary skill in the art without making creative efforts
All other embodiment, shall fall within the protection scope of the present invention.
The term used in embodiments of the present invention is only to be not intended to be limiting merely for for the purpose of describing particular embodiments
The present invention.In the embodiment of the present invention and the "an" of singular used in the attached claims, " described " and "the"
It is also intended to including most forms, unless the context clearly indicates other meaning, " a variety of " generally comprise at least two.
It should be appreciated that term "and/or" used herein is only a kind of incidence relation for describing affiliated partner, indicate
There may be three kinds of relationships, for example, A and/or B, can indicate: individualism A, exist simultaneously A and B, individualism B these three
Situation.In addition, character "/" herein, typicallys represent the relationship that forward-backward correlation object is a kind of "or".
It will be appreciated that though may be described in embodiments of the present invention using term first, second, third, etc..,
But these ... it should not necessarily be limited by these terms.These terms be only used to by ... distinguish.For example, not departing from implementation of the present invention
In the case where example range, first ... can also be referred to as second ..., and similarly, second ... can also be referred to as the
One ....
Depending on context, word as used in this " if ", " if " can be construed to " ... when " or
" when ... " or " in response to determination " or " in response to detection ".Similarly, context is depended on, phrase " if it is determined that " or " such as
Fruit detection (condition or event of statement) " can be construed to " when determining " or " in response to determination " or " when detection (statement
Condition or event) when " or " in response to detection (condition or event of statement) ".
It should also be noted that, the terms "include", "comprise" or its any other variant are intended to nonexcludability
Include, so that commodity or device including a series of elements not only include those elements, but also including not clear
The other element listed, or further include for this commodity or the intrinsic element of device.In the feelings not limited more
Under condition, the element that is limited by sentence "including a ...", it is not excluded that in the commodity or device for including the element also
There are other identical elements.
Embodiment 1
Referring to Fig. 1, the embodiment of the present invention provides a kind of implementation method of a key outgoing call, this method comprises the following steps:
S1 sends application for registration to call center services end.
Specifically, multiple terminals are docked with call center respectively, and request authorization code to server-side application, work as service
End can return to the request authorization code after.The terminal includes multiple operation systems, such as sale, real estate business.
S2 obtains application ID and applied cryptography that the server-side returns.
Specifically, call center issues unique application ID (App ID) and applied cryptography (App Sercet) to terminal,
Namely service access side.
S3 exchanges the authorization access token of the present terminal in conjunction with present terminal and the application ID, applied cryptography.
Specifically, terminal exchanges the present terminal in conjunction with current using terminal according to the application ID, applied cryptography
Authorization access token (Access Token).Which terminal the Access Token is for identifying.Terminal must be held
Access Token accesses server-side, and only effective Access Token can just access server-side and subsequent tune
Use interface.
The combination present terminal and the application ID, applied cryptography, exchange the authorization access token of the present terminal for,
Include: to be encrypted to presently described application ID and current timestamp, generates one 20 random numbers, which is institute
State the exclusive authority access token of present terminal.In the present embodiment, the Encryption Algorithm uses md5 encryption algorithm.
The essential information that the present terminal is attended a banquet is encrypted into the authorization access token of the present terminal, is obtained by S4
The authorization access token for taking the present terminal to attend a banquet.
Specifically, the essential information and the Access Token request present terminal attended a banquet by present terminal are sat
The interface of seat authorization message, to obtain the authorization access token (Sns Access Token) that the present terminal is attended a banquet.Institute
State Sns Access Token is mainly used for identifying which user in which client.
The computational algorithm for obtaining the authorization access token that the present terminal is attended a banquet includes: by JWT (' JSON
The abbreviation of Web Token ') essential information attended a banquet to the present terminal of algorithm encrypts, and when encryption validity period is set
Between, obtain the authorization access token that the present terminal is attended a banquet.The essential information that the present terminal is attended a banquet can be stepping on of attending a banquet
Record account, wherein the login account includes but is not limited to work number, any user name.In the present embodiment, the encryption validity period
It is 2 hours.
S5, external calling telephone number carry out symmetric cryptography, obtain encrypted number.
Specifically, terminal encrypts the telephone number of the outgoing call using symmetrical enciphering and deciphering algorithm.In the present embodiment,
The applied cryptography that terminal is presented at the call center services end is set as key, the telephone number of the outgoing call is added
It is close.The external calling telephone number carries out symmetric cryptography, obtains encrypted number, comprising: by symmetry algorithm by the true of outgoing call
Number is encrypted with the applied cryptography, obtains corresponding encrypted characters string, which is the encrypted number.
The present terminal is using the encrypted characters string as the content of network transmission, at this point, showing in terminal page
Number is to hide number, which, which can be, is hidden the centre four of true number.Assuming that symmetric cryptography is true
The encrypted number that telephone number obtains is xhjaxd7123xxxcdjda2899dajhhdas, and terminal only needs showing number
A click event is write in position, as long as terminal triggers the click event, the encrypted number is passed as the data of interaction between system
Give call center services end.
S6, sends the encrypted number and authorization access token that the present terminal is attended a banquet is to call center services end,
So that the true number of call center services end calling customer.
Specifically, the encrypted characters string and Sns Access Token that have just obtained are transferred to calling by the present terminal
The outer calling function of a key is realized by the outgoing call interface in the unified outgoing call interface that center service end provides, call center services end.
The true number of call center services end calling customer, comprising:
S61 decrypts the authorization access token that the present terminal is attended a banquet, and obtains the essential information that present terminal is attended a banquet;
S62 decrypts the encrypted number by symmetric encipherment algorithm, obtains the true number of outgoing call;
S63 calls the outgoing call interface of call center itself, calls the true number.
Key outgoing call implementation method provided in an embodiment of the present invention, which makes to attend a banquet, no longer needs to input complicated number, Neng Goushi
Existing one key of seat personnel dials into client;In addition, encryption and decryption transmission can be carried out to original number, seat personnel is made to cannot see that visitor
The true number at family, protects the privacy of user;Further, the working efficiency of seat personnel and the accuracy of data are able to ascend.
Embodiment 2
Referring to Fig. 3, the embodiment of the present invention provides a kind of terminal 300, which includes: application sending module 310,
Module 320 is obtained, exchanges module 330, information encrypting module 340, telephone encryption module 350 and data transmission blocks 360 for.
The application sending module 310, for sending application for registration to call center services end.Specifically, multiple terminals
It is docked respectively with call center, authorization code is requested to server-side application by the application sending module 310, works as server-side
By the way that the request authorization code can be returned later.The terminal includes multiple operation systems, such as sale, real estate business.
The acquisition module 320, for obtaining the application ID and applied cryptography that the server-side returns.Specifically, calling
Unique application ID (App ID) and applied cryptography (App Sercet) is issued to terminal, that is, service access side in center.Institute
Stating request authorization code is application ID and applied cryptography.
It is described to exchange module 330 for, for exchanging the current end in conjunction with present terminal and the application ID, applied cryptography
The authorization access token at end.Specifically, described exchange module 330 for according to the application ID, applied cryptography in conjunction with current use
Terminal exchanges the authorization access token (Access Token) of the present terminal for.Which the Access Token is for identifying
A terminal.The terminal must hold Access Token to access server-side, and only effective Access Token is
It can be carried out access server-side, and carry out the work of subsequent calls interface.
The Processing Algorithm for exchanging module 330 for includes: to encrypt to presently described application ID and current timestamp,
One 20 random numbers are generated, which is the exclusive authority access token of the present terminal.It is described in the present embodiment
Encryption Algorithm uses md5 encryption algorithm.
The information encrypting module 340, the essential information for the present terminal to be attended a banquet were encrypted to the current end
In the authorization access token at end, the authorization access token that the present terminal is attended a banquet is obtained.Specifically, the information encrypting module
340 essential informations attended a banquet by present terminal and the Access Token request present terminal are attended a banquet authorization message
Interface, to obtain the authorization access token (Sns Access Token) that the present terminal is attended a banquet.The Sns Access
Token is mainly used for identifying which user in which client.
The computational algorithm of the information encrypting module 340 includes: by JWT (' abbreviation of JSON Web Token ') algorithm
The essential information attended a banquet to the present terminal encrypts, and encryption time validity period is arranged, and obtains the present terminal and sits
The authorization access token of seat.The essential information that the present terminal is attended a banquet can be the login account attended a banquet, wherein the login account
Number include but is not limited to work number, any user name.In the present embodiment, the encryption validity period is 2 hours.
The telephone encryption module 350 carries out symmetric cryptography for external calling telephone number, obtains encrypted number.Specifically
, the telephone encryption module 350 encrypts the telephone number of the outgoing call using symmetrical enciphering and deciphering algorithm.The present embodiment
In, the applied cryptography that terminal is presented at the call center services end is set as key by the telephone encryption module 350, to described
The telephone number of outgoing call is encrypted.The Encryption Algorithm of the telephone encryption module 350 includes: by symmetry algorithm by outgoing call
True number is encrypted with the applied cryptography, obtains corresponding encrypted characters string, which is the encryption numbers
Code.
The present terminal is using the encrypted characters string as the content of network transmission, at this point, showing in terminal page
Number is to hide number, which, which can be, is hidden the centre four of true number.Assuming that symmetric cryptography is true
The encrypted number that telephone number obtains is xhjaxd7123xxxcdjda2899dajhhdas, and terminal only needs showing number
A click event is write in position, as long as terminal triggers the click event, the encrypted number is passed as the data of interaction between system
Give call center services end.
The data transmission blocks 360, the authorization access token attended a banquet for the encrypted number and the present terminal
To call center services end, so that the true number of call center services end calling customer.Specifically, the data are sent
Module 360 is transferred to the encrypted characters string and Sns Access Token that have just obtained the unification of call center services end offer
The outer calling function of a key is realized by the outgoing call interface in outgoing call interface, call center services end.Fig. 4 show call center services
The structural schematic diagram at end, the call center services end 400 include:
Information deciphering module 410, the authorization access token attended a banquet for decrypting the present terminal obtain present terminal and sit
The essential information of seat;
Phone deciphering module 420 obtains true number of outgoing call for decrypting the encrypted number by symmetric encipherment algorithm
Code;
Call module 430 calls the true number for calling the outgoing call interface of call center itself.
Terminal provided in an embodiment of the present invention, which makes to attend a banquet, no longer needs to input complicated number, can be realized seat personnel one
Key dials into client;In addition, encryption and decryption transmission can be carried out to original number, seat personnel is made to cannot see that true number of client
Code, protects the privacy of user;Further, the working efficiency of seat personnel and the accuracy of data are able to ascend.
Embodiment 3
As shown in figure 5, the equipment is used for the intelligent Matching method of property tax platform the present embodiment provides a kind of electronic equipment,
The electronic equipment, comprising: at least one processor;And the memory being connect at least one described processor communication;Its
In,
The memory is stored with the instruction that can be executed by one processor, and described instruction is by described at least one
Manage device execute so that at least one described processor can:
Application for registration is sent to call center services end;
Obtain the application ID and applied cryptography that the server-side returns;
In conjunction with present terminal and the application ID, applied cryptography, the authorization access token of the present terminal is exchanged for;
The essential information that the present terminal is attended a banquet is encrypted into the authorization access token of the present terminal, institute is obtained
State the authorization access token that present terminal is attended a banquet;
External calling telephone number carries out symmetric cryptography, obtains encrypted number;
It sends the encrypted number and authorization access token that the present terminal is attended a banquet is to call center services end, so that
The true number of call center services end calling customer.
Embodiment 4
The embodiment of the present disclosure provides a kind of nonvolatile computer storage media, and the computer storage medium is stored with
The key outgoing call realization side in above-mentioned any means embodiment can be performed in computer executable instructions, the computer executable instructions
Method.
Embodiment 5
Below with reference to Fig. 6, it illustrates the structural representations for the electronic equipment 600 for being suitable for being used to realize the embodiment of the present disclosure
Figure.Terminal device in the embodiment of the present disclosure can include but is not limited to such as mobile phone, laptop, digital broadcasting and connect
Receive device, PDA (personal digital assistant), PAD (tablet computer), PMP (portable media player), car-mounted terminal (such as vehicle
Carry navigation terminal) etc. mobile terminal and such as number TV, desktop computer etc. fixed terminal.Electricity shown in Fig. 6
Sub- equipment is only an example, should not function to the embodiment of the present disclosure and use scope bring any restrictions.
As shown in fig. 6, electronic equipment 600 may include processing unit (such as central processing unit, graphics processor etc.)
601, random access can be loaded into according to the program being stored in read-only memory (ROM) 602 or from storage device 608
Program in memory (RAM) 603 and execute various movements appropriate and processing.In RAM 603, it is also stored with electronic equipment
Various programs and data needed for 600 operations.Processing unit 601, ROM 602 and RAM 603 pass through the phase each other of bus 604
Even.Input/output (I/O) interface 605 is also connected to bus 604.
In general, following device can connect to I/O interface 605: including such as touch screen, touch tablet, keyboard, mouse, taking the photograph
As the input unit 606 of head, microphone, accelerometer, gyroscope etc.;Including such as liquid crystal display (LCD), loudspeaker, vibration
The output device 607 of dynamic device etc.;Storage device 608 including such as tape, hard disk etc.;And communication device 609.Communication device
609, which can permit electronic equipment 600, is wirelessly or non-wirelessly communicated with other equipment to exchange data.Although Fig. 6 shows tool
There is the electronic equipment 600 of various devices, it should be understood that being not required for implementing or having all devices shown.It can be with
Alternatively implement or have more or fewer devices.
Particularly, in accordance with an embodiment of the present disclosure, it may be implemented as computer above with reference to the process of flow chart description
Software program.For example, embodiment of the disclosure includes a kind of computer program product comprising be carried on computer-readable medium
On computer program, which includes the program code for method shown in execution flow chart.In such reality
It applies in example, which can be downloaded and installed from network by communication device 609, or from storage device 608
It is mounted, or is mounted from ROM 602.When the computer program is executed by processing unit 601, the embodiment of the present disclosure is executed
Method in the above-mentioned function that limits.
It should be noted that the above-mentioned computer-readable medium of the disclosure can be computer-readable signal media or meter
Calculation machine readable storage medium storing program for executing either the two any combination.Computer readable storage medium for example can be --- but not
Be limited to --- electricity, magnetic, optical, electromagnetic, infrared ray or semiconductor system, device or device, or any above combination.Meter
The more specific example of calculation machine readable storage medium storing program for executing can include but is not limited to: have the electrical connection, just of one or more conducting wires
Taking formula computer disk, hard disk, random access storage device (RAM), read-only memory (ROM), erasable type may be programmed read-only storage
Device (EPROM or flash memory), optical fiber, portable compact disc read-only memory (CD-ROM), light storage device, magnetic memory device,
Or above-mentioned any appropriate combination.In the disclosure, computer readable storage medium can be it is any include or storage journey
The tangible medium of sequence, the program can be commanded execution system, device or device use or in connection.And at this
In open, computer-readable signal media may include in a base band or as the data-signal that carrier wave a part is propagated,
In carry computer-readable program code.The data-signal of this propagation can take various forms, including but not limited to
Electromagnetic signal, optical signal or above-mentioned any appropriate combination.Computer-readable signal media can also be computer-readable and deposit
Any computer-readable medium other than storage media, the computer-readable signal media can send, propagate or transmit and be used for
By the use of instruction execution system, device or device or program in connection.Include on computer-readable medium
Program code can transmit with any suitable medium, including but not limited to: electric wire, optical cable, RF (radio frequency) etc. are above-mentioned
Any appropriate combination.
Above-mentioned computer-readable medium can be included in above-mentioned electronic equipment;It is also possible to individualism, and not
It is fitted into the electronic equipment.
The calculating of the operation for executing the disclosure can be write with one or more programming languages or combinations thereof
Machine program code, above procedure design language include object oriented program language-such as Java, Smalltalk, C+
+, it further include conventional procedural programming language-such as " C " language or similar programming language.Program code can
Fully to execute, partly execute on the user computer on the user computer, be executed as an independent software package,
Part executes on the remote computer or executes on a remote computer or server completely on the user computer for part.
In situations involving remote computers, remote computer can pass through the network of any kind --- including local area network (LAN)
Or wide area network (WAN)-is connected to subscriber computer, or, it may be connected to outer computer (such as utilize Internet service
Provider is connected by internet).
Flow chart and block diagram in attached drawing are illustrated according to the system of the various embodiments of the disclosure, method and computer journey
The architecture, function and operation in the cards of sequence product.In this regard, each box in flowchart or block diagram can generation
A part of one module, program segment or code of table, a part of the module, program segment or code include one or more use
The executable instruction of the logic function as defined in realizing.It should also be noted that in some implementations as replacements, being marked in box
The function of note can also occur in a different order than that indicated in the drawings.For example, two boxes succeedingly indicated are actually
It can be basically executed in parallel, they can also be executed in the opposite order sometimes, and this depends on the function involved.Also it to infuse
Meaning, the combination of each box in block diagram and or flow chart and the box in block diagram and or flow chart can be with holding
The dedicated hardware based system of functions or operations as defined in row is realized, or can use specialized hardware and computer instruction
Combination realize.
Being described in unit involved in the embodiment of the present disclosure can be realized by way of software, can also be by hard
The mode of part is realized.Wherein, the title of unit does not constitute the restriction to the unit itself under certain conditions, for example, the
One acquiring unit is also described as " obtaining the unit of at least two internet protocol addresses ".
Claims (10)
1. a kind of implementation method of a key outgoing call characterized by comprising
Application for registration is sent to call center services end;
Obtain the application ID and applied cryptography that the server-side returns;
In conjunction with present terminal and the application ID, applied cryptography, the authorization access token of the present terminal is exchanged for;
The essential information that the present terminal is attended a banquet is encrypted into the authorization access token of the present terminal, is worked as described in acquisition
The authorization access token that preceding terminal is attended a banquet;
External calling telephone number carries out symmetric cryptography, obtains encrypted number;
It sends the encrypted number and authorization access token that the present terminal is attended a banquet is to call center services end, so that described
The true number of call center services end calling customer.
2. the method according to claim 1, wherein the combination present terminal with the application ID, using close
Code, exchanges the authorization access token of the present terminal for, comprising:
Presently described application ID and current timestamp are encrypted, generate one 20 random numbers, which is institute
State the exclusive authority access token of present terminal.
3. according to the method described in claim 2, it is characterized in that, the Encryption Algorithm uses md5 encryption algorithm.
4. the method according to claim 1, wherein the authorization access order for obtaining the present terminal and attending a banquet
The computational algorithm of board includes:
It is encrypted by the essential information that JWT algorithm attends a banquet to the present terminal, and encryption time validity period is set, obtained
The authorization access token that the present terminal is attended a banquet.
5. being obtained the method according to claim 1, wherein the external calling telephone number carries out symmetric cryptography
Encrypted number, comprising:
The true number of outgoing call is encrypted with the applied cryptography by symmetry algorithm, obtains corresponding encrypted characters string,
The encrypted characters string is the encrypted number.
6. the method according to claim 1, wherein true number of call center services end calling customer
Code, comprising:
The authorization access token that the present terminal is attended a banquet is decrypted, the essential information that present terminal is attended a banquet is obtained;
The encrypted number is decrypted by symmetric encipherment algorithm, obtains the true number of outgoing call;
The outgoing call interface of call center itself is called, the true number is called.
7. the method according to claim 1, wherein the essential information that the present terminal is attended a banquet includes attending a banquet
Login account.
8. a kind of terminal characterized by comprising
Apply for sending module, for sending application for registration to call center services end;
Module is obtained, for obtaining the application ID and applied cryptography that the server-side returns;
Module is exchanged for, for exchanging the authorization access of the present terminal in conjunction with present terminal and the application ID, applied cryptography
Token;
Information encrypting module, the essential information for the present terminal to be attended a banquet are encrypted to the authorization access of the present terminal
In token, the authorization access token that the present terminal is attended a banquet is obtained;
Telephone encryption module carries out symmetric cryptography for external calling telephone number, obtains encrypted number;
Data transmission blocks, authorization access token to the call center attended a banquet for the encrypted number and the present terminal take
Business end, so that the true number of call center services end calling customer.
9. a kind of computer readable storage medium, is stored thereon with computer program, which is characterized in that described program is by processor
The method as described in any one of claims 1 to 7 is realized when execution.
10. a kind of electronic equipment characterized by comprising
One or more processors;
Storage device, for storing one or more programs, when one or more of programs are by one or more of processing
When device executes, so that one or more of processors realize the method as described in any one of claims 1 to 7.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910394162.0A CN110121010B (en) | 2019-05-13 | 2019-05-13 | One-key outbound realization method, terminal, medium and electronic equipment |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910394162.0A CN110121010B (en) | 2019-05-13 | 2019-05-13 | One-key outbound realization method, terminal, medium and electronic equipment |
Publications (2)
Publication Number | Publication Date |
---|---|
CN110121010A true CN110121010A (en) | 2019-08-13 |
CN110121010B CN110121010B (en) | 2020-05-15 |
Family
ID=67522258
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201910394162.0A Active CN110121010B (en) | 2019-05-13 | 2019-05-13 | One-key outbound realization method, terminal, medium and electronic equipment |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN110121010B (en) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN113923306A (en) * | 2021-10-13 | 2022-01-11 | 上海淇馥信息技术有限公司 | Internet online voice communication method and device and electronic equipment |
EP4332813A1 (en) | 2022-09-01 | 2024-03-06 | Manifone | Method for preserving privacy of telephone numbers used for telephone prospecting campaigns |
Citations (13)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101163014A (en) * | 2007-11-30 | 2008-04-16 | 中国电信股份有限公司 | Dynamic password identification authenticating system and method |
CN101257664A (en) * | 2007-02-28 | 2008-09-03 | 株式会社日立制作所 | Call controlling equipment and call controlling method |
CN102984329A (en) * | 2012-09-26 | 2013-03-20 | 任峰 | Calling method of demanding callback and automatic off-hook through data network for smart phone |
CN103067169A (en) * | 2011-12-01 | 2013-04-24 | 微软公司 | Application licensing authentication |
CN103246989A (en) * | 2013-05-13 | 2013-08-14 | 上海言海网络信息技术有限公司 | Cloud-computing-based crazy telesale system |
CN103685177A (en) * | 2012-09-12 | 2014-03-26 | 中国移动通信集团四川有限公司 | Method, device and system for processing IMS (Ip Multimedia Subsystem) network call |
CN104468518A (en) * | 2014-11-10 | 2015-03-25 | 腾讯科技(深圳)有限公司 | Service management method, device and system |
US9197746B2 (en) * | 2008-02-05 | 2015-11-24 | Avaya Inc. | System, method and apparatus for authenticating calls |
CN106603876A (en) * | 2016-11-10 | 2017-04-26 | 河南智业科技发展有限公司 | Cloud service based calling system |
CN106982305A (en) * | 2017-03-23 | 2017-07-25 | 青岛融贯汇众软件有限公司 | A kind of method of calling based on Call Center Platform |
CN107690040A (en) * | 2017-05-25 | 2018-02-13 | 上海爱优威软件开发有限公司 | Automatic dial method |
CN208445636U (en) * | 2018-07-04 | 2019-01-29 | 中通天鸿(北京)通信科技股份有限公司 | A kind of call platform device |
CN109688279A (en) * | 2018-08-31 | 2019-04-26 | 平安科技(深圳)有限公司 | Traffic handling method, apparatus, equipment and computer readable storage medium |
-
2019
- 2019-05-13 CN CN201910394162.0A patent/CN110121010B/en active Active
Patent Citations (13)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101257664A (en) * | 2007-02-28 | 2008-09-03 | 株式会社日立制作所 | Call controlling equipment and call controlling method |
CN101163014A (en) * | 2007-11-30 | 2008-04-16 | 中国电信股份有限公司 | Dynamic password identification authenticating system and method |
US9197746B2 (en) * | 2008-02-05 | 2015-11-24 | Avaya Inc. | System, method and apparatus for authenticating calls |
CN103067169A (en) * | 2011-12-01 | 2013-04-24 | 微软公司 | Application licensing authentication |
CN103685177A (en) * | 2012-09-12 | 2014-03-26 | 中国移动通信集团四川有限公司 | Method, device and system for processing IMS (Ip Multimedia Subsystem) network call |
CN102984329A (en) * | 2012-09-26 | 2013-03-20 | 任峰 | Calling method of demanding callback and automatic off-hook through data network for smart phone |
CN103246989A (en) * | 2013-05-13 | 2013-08-14 | 上海言海网络信息技术有限公司 | Cloud-computing-based crazy telesale system |
CN104468518A (en) * | 2014-11-10 | 2015-03-25 | 腾讯科技(深圳)有限公司 | Service management method, device and system |
CN106603876A (en) * | 2016-11-10 | 2017-04-26 | 河南智业科技发展有限公司 | Cloud service based calling system |
CN106982305A (en) * | 2017-03-23 | 2017-07-25 | 青岛融贯汇众软件有限公司 | A kind of method of calling based on Call Center Platform |
CN107690040A (en) * | 2017-05-25 | 2018-02-13 | 上海爱优威软件开发有限公司 | Automatic dial method |
CN208445636U (en) * | 2018-07-04 | 2019-01-29 | 中通天鸿(北京)通信科技股份有限公司 | A kind of call platform device |
CN109688279A (en) * | 2018-08-31 | 2019-04-26 | 平安科技(深圳)有限公司 | Traffic handling method, apparatus, equipment and computer readable storage medium |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN113923306A (en) * | 2021-10-13 | 2022-01-11 | 上海淇馥信息技术有限公司 | Internet online voice communication method and device and electronic equipment |
CN113923306B (en) * | 2021-10-13 | 2023-10-20 | 上海淇馥信息技术有限公司 | Internet online voice communication method and device and electronic equipment |
EP4332813A1 (en) | 2022-09-01 | 2024-03-06 | Manifone | Method for preserving privacy of telephone numbers used for telephone prospecting campaigns |
Also Published As
Publication number | Publication date |
---|---|
CN110121010B (en) | 2020-05-15 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US11520912B2 (en) | Methods, media, apparatuses and computing devices of user data authorization based on blockchain | |
CN110245510A (en) | Method and apparatus for predictive information | |
US10587591B2 (en) | Generating a password | |
CN113228011A (en) | Data sharing | |
CN109241181A (en) | Database operation method and device | |
CN109255210A (en) | The method, apparatus and storage medium of intelligent contract are provided in block chain network | |
CN110084034A (en) | A kind of cipher set-up method, storage medium and electronic equipment based on weak passwurd detection | |
CN112287372A (en) | Method and apparatus for protecting clipboard privacy | |
CN110535659A (en) | Method and apparatus for handling request of data | |
CN110263565A (en) | Method and apparatus for calling service | |
EP4350556A1 (en) | Information verification method and apparatus | |
CN112039826A (en) | Login method and device applied to applet terminal | |
US20180255004A1 (en) | Systems and methods for providing requested user information to a validated user | |
CN110121010A (en) | One key outgoing call implementation method, terminal, medium and electronic equipment | |
CN113609781A (en) | Automobile production mold optimization method, system, equipment and medium based on federal learning | |
CN112487451A (en) | Display method and device and electronic equipment | |
CN111291396A (en) | Form data processing method and device, electronic equipment and storage medium | |
US20200145200A1 (en) | Attribute-based key management system | |
CN111767550A (en) | Data storage method and device | |
CN109981446A (en) | Information generating method, electronic equipment and computer-readable medium | |
CN108737402A (en) | Mobile terminal safety means of defence and device | |
US9667655B2 (en) | Intelligent content ghosting on mobile devices | |
US20120101829A1 (en) | Wholesale device registration system, method, and program product | |
CN109725951A (en) | Control method, system, electronic equipment and computer-readable medium | |
CN110492998A (en) | The method of encryption and decryption data |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |